[bridged from https://infosec.exchange/@raptor on the fediverse by https://fed.brid.gy/ ]
When I watch sector specific experts tell me their sector is special.<snark />. They're more like other sectors than they necessarily think.
When I watch sector specific experts tell me their sector is special.<snark />. They're more like other sectors than they necessarily think.
Apparently no other complete copies are known to exist: https://gunkies.org/wiki/UNIX_Fourth_Edition
We have arranged to deliver it to the Computer History Museum
#retrocomputing
Apparently no other complete copies are known to exist: https://gunkies.org/wiki/UNIX_Fourth_Edition
We have arranged to deliver it to the Computer History Museum
#retrocomputing
https://hnsecurity.it/blog/groovy-template-engine-exploitation-part-2/
Check out some new practical exploitation tricks that he figured out while working on […]
https://hnsecurity.it/blog/groovy-template-engine-exploitation-part-2/
Check out some new practical exploitation tricks that he figured out while working on […]
owasp.org/Top10/2025/0...
The definitive release should be out on November 20th
owasp.org/Top10/2025/0...
The definitive release should be out on November 20th
- tool A found a possible flaw in code and reported it.
- using the plain English description from tool A, tool B could create a reproducible by itself that verified the finding
The sense of magic is […]
- tool A found a possible flaw in code and reported it.
- using the plain English description from tool A, tool B could create a reproducible by itself that verified the finding
The sense of magic is […]
As of this release, Brida 0.6 supports only Frida 17 and later. For users who still rely on older Frida versions, Brida 0.6pre remains available on GitHub.
Get the latest release here […]
As of this release, Brida 0.6 supports only Frida 17 and later. For users who still rely on older Frida versions, Brida 0.6pre remains available on GitHub.
Get the latest release here […]
From the Computer History Museum: https://computerhistory.org/blog/a-computing-legend-speaks/
Click thru a while to get a text transcript.
From the Computer History Museum: https://computerhistory.org/blog/a-computing-legend-speaks/
Click thru a while to get a text transcript.
“In March 2025, #kaspersky detected a wave of infections that occurred when users clicked on personalized #phishing links sent via email. No further action was required to initiate the infection; simply visiting the malicious website using Google […]
“In March 2025, #kaspersky detected a wave of infections that occurred when users clicked on personalized #phishing links sent via email. No further action was required to initiate the infection; simply visiting the malicious website using Google […]
https://www.npmjs.com/package/@yowasp/clang
https://www.npmjs.com/package/@yowasp/clang
[Original post on infosec.exchange]
[Original post on infosec.exchange]
OpenBSD fixed it by adopting a non-predictable PRNG, BIND dev refused to use the same approach cuz "DNSSEC fixes this"
10 years later Dan Kaminsky rediscovered it with a better way to exploit the weakness. Vendors adopted OpenBSD's […]
OpenBSD fixed it by adopting a non-predictable PRNG, BIND dev refused to use the same approach cuz "DNSSEC fixes this"
10 years later Dan Kaminsky rediscovered it with a better way to exploit the weakness. Vendors adopted OpenBSD's […]
I think I am taking crazy pills!
FWIW: The first ever vulnerability I reported to a vendor was a DNS cache poisoning attack against BIND due its use of predictable query IDs.
I reported it.... in 1996! […]
I think I am taking crazy pills!
FWIW: The first ever vulnerability I reported to a vendor was a DNS cache poisoning attack against BIND due its use of predictable query IDs.
I reported it.... in 1996! […]
https://infosec.exchange/@xme/115422139879568495
https://infosec.exchange/@xme/115422139879568495
Mediatek PSIRT assigned CVE IDs only to 3 of them cuz the others were considered "low severity".
This is The Way
https://labs.taszk.io/articles/post/eastern_promises/
Mediatek PSIRT assigned CVE IDs only to 3 of them cuz the others were considered "low severity".
This is The Way
https://labs.taszk.io/articles/post/eastern_promises/
Thankfully, there's a way […]
[Original post on chaos.social]
Thankfully, there's a way […]
[Original post on chaos.social]
https://daniel.haxx.se/blog/2008/10/15/strcasecmp-in-turkish/
https://daniel.haxx.se/blog/2008/10/15/strcasecmp-in-turkish/
https://my.f5.com/manage/s/article/K000151297
https://my.f5.com/manage/s/article/K000151297
https://hnsecurity.it/blog/streamlining-vulnerability-research-with-the-idalib-rust-bindings-for-ida-9-2/
Originally featured last week as a […]
https://hnsecurity.it/blog/streamlining-vulnerability-research-with-the-idalib-rust-bindings-for-ida-9-2/
Originally featured last week as a […]
https://ochagavia.nl/blog/configuration-files-are-user-interfaces/
https://ochagavia.nl/blog/configuration-files-are-user-interfaces/
So many anecdotes and such a crisp description of that era..
I am a decade older than "MB" but I lived what he talks about and met all the actors.
Crazy times
https://www.youtube.com/watch?v=PN2RQ_O2Cq0
So many anecdotes and such a crisp description of that era..
I am a decade older than "MB" but I lived what he talks about and met all the actors.
Crazy times
https://www.youtube.com/watch?v=PN2RQ_O2Cq0